Linux’s command line interface (CLI) is a common place to find me while I conduct both SysAd and Security based tasks; from Apache config and dev setup to port scanning and patching. CLI skills are both helpful and extremely powerful, especially as the majority of my servers have no desktop running on them. Don’t get me wrong a GUI can be useful for certain tasks; email, large project work and photo manipulation. Although I see myself skilled in using various CLIs, I still find myself searching Google for new and even more powerful ways of doing tasks via the CLI.

Explaining Denial of Service Attacks

by Paul Joyce

Denial of Service attacks (DoS attacks) are rather simplistic in nature and devilishly easy to launch. In their simplest form against a well patched and updated system they don’t usually pose too much of a threat, however like most things they have bigger and more dangerous brothers out there. Sometimes its hard to explain a […]

Tags: , , , , ,

How to use Linux’s Traceroute (3 Examples)

by Paul Joyce

Connections over a network often need debugging but due to the nature of the networking-beast, the actual topography of the network may be unknown. Connections are usually perceived as going from A to B, for example your desktop computer connects to Amazons website. To help expose the exact topography of a network we can use […]

Tags: , , , , , ,

Linux: Changing your password from the CLI

by Paul Joyce

We all know that passwords are some of the most important pieces of information we have to remember, but on top of that we’re told we should change them regularly. This is all well and good, but do you know how to change your Linux password when you can’t get into the X windows manager? […]

Tags: , , , , ,

MCrypt – Securing your Linux files with Twofish Cryptography

by Paul Joyce

With more and more details being stored on computers, it’s getting exponentially more important to keep them safe and secure. From internet banking to Facebook, renewing car tax to ordering presents on Amazon, you have entered a lot of data onto your computer. But how do you keep files of a sensitive nature secure?  Could something called […]

Tags: , , , , , , , ,

Links and useful footery things…

Copyright © 2017 Paul Joyce. Follow me on Twitter or perhaps Google+